mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
110 lines
4.6 KiB
Java
110 lines
4.6 KiB
Java
/*
|
|
* Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation. Oracle designates this
|
|
* particular file as subject to the "Classpath" exception as provided
|
|
* by Oracle in the LICENSE file that accompanied this code.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
package sun.security.ssl;
|
|
|
|
import java.io.IOException;
|
|
import java.security.cert.X509Certificate;
|
|
|
|
import sun.security.ssl.ClientHello.ClientHelloMessage;
|
|
|
|
class ClientHandshakeContext extends HandshakeContext {
|
|
/*
|
|
* Allow unsafe server certificate change?
|
|
*
|
|
* Server certificate change during SSL/TLS renegotiation may be considered
|
|
* unsafe, as described in the Triple Handshake attacks:
|
|
*
|
|
* https://secure-resumption.com/tlsauth.pdf
|
|
*
|
|
* Endpoint identification (See
|
|
* SSLParameters.getEndpointIdentificationAlgorithm()) is a pretty nice
|
|
* guarantee that the server certificate change in renegotiation is legal.
|
|
* However, endpoint identification is only enabled for HTTPS and LDAP
|
|
* over SSL/TLS by default. It is not enough to protect SSL/TLS
|
|
* connections other than HTTPS and LDAP.
|
|
*
|
|
* The renegotiation indication extension (See RFC 5746) is a pretty
|
|
* strong guarantee that the endpoints on both client and server sides
|
|
* are identical on the same connection. However, the Triple Handshake
|
|
* attacks can bypass this guarantee if there is a session-resumption
|
|
* handshake between the initial full handshake and the renegotiation
|
|
* full handshake.
|
|
*
|
|
* Server certificate change may be unsafe and should be restricted if
|
|
* endpoint identification is not enabled and the previous handshake is
|
|
* a session-resumption abbreviated initial handshake, unless the
|
|
* identities represented by both certificates can be regraded as the
|
|
* same (See isIdentityEquivalent()).
|
|
*
|
|
* Considering the compatibility impact and the actual requirements to
|
|
* support server certificate change in practice, the system property,
|
|
* jdk.tls.allowUnsafeServerCertChange, is used to define whether unsafe
|
|
* server certificate change in renegotiation is allowed or not. The
|
|
* default value of the system property is "false". To mitigate the
|
|
* compatibility impact, applications may want to set the system
|
|
* property to "true" at their own risk.
|
|
*
|
|
* If the value of the system property is "false", server certificate
|
|
* change in renegotiation after a session-resumption abbreviated initial
|
|
* handshake is restricted (See isIdentityEquivalent()).
|
|
*
|
|
* If the system property is set to "true" explicitly, the restriction on
|
|
* server certificate change in renegotiation is disabled.
|
|
*/
|
|
static final boolean allowUnsafeServerCertChange =
|
|
Utilities.getBooleanProperty(
|
|
"jdk.tls.allowUnsafeServerCertChange", false);
|
|
|
|
/*
|
|
* the reserved server certificate chain in previous handshaking
|
|
*
|
|
* The server certificate chain is only reserved if the previous
|
|
* handshake is a session-resumption abbreviated initial handshake.
|
|
*/
|
|
X509Certificate[] reservedServerCerts = null;
|
|
|
|
X509Certificate[] deferredCerts;
|
|
|
|
ClientHelloMessage initialClientHelloMsg = null;
|
|
|
|
// PSK identity is selected in first Hello and used again after HRR
|
|
byte[] pskIdentity;
|
|
|
|
ClientHandshakeContext(SSLContextImpl sslContext,
|
|
TransportContext conContext) throws IOException {
|
|
super(sslContext, conContext);
|
|
}
|
|
|
|
@Override
|
|
void kickstart() throws IOException {
|
|
if (kickstartMessageDelivered) {
|
|
return;
|
|
}
|
|
|
|
SSLHandshake.kickstart(this);
|
|
kickstartMessageDelivered = true;
|
|
}
|
|
}
|